ExamGecko
Question list
Search
Search

Related questions











Question 672 - CISA discussion

Report
Export

Which of the following should be identified FIRST during the risk assessment process?

A.
Vulnerability to threats
Answers
A.
Vulnerability to threats
B.
Existing controls
Answers
B.
Existing controls
C.
Information assets
Answers
C.
Information assets
D.
Legal requirements
Answers
D.
Legal requirements
Suggested answer: C

Explanation:

The risk assessment process involves identifying the information assets that are at risk, analyzing the threats and vulnerabilities that could affect them, evaluating the impact and likelihood of a risk event, and determining the appropriate controls to mitigate the risk. The first step is to identify the information assets, as they are the objects of protection and the basis for the rest of the process. Without knowing what assets are at risk, it is not possible to assess their value, exposure, or protection level.Reference:ISACA Frameworks: Blueprints for Success

asked 18/09/2024
Mustaqueahmed Ghanchibhai
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first